Lucene search

K
saintSAINT CorporationSAINT:B2660CE062984A807CAD18707B2DF54E
HistoryApr 16, 2007 - 12:00 a.m.

Windows DNS server RPC management interface buffer overflow

2007-04-1600:00:00
SAINT Corporation
www.saintcorporation.com
45

0.969 High

EPSS

Percentile

99.7%

Added: 04/16/2007
CVE: CVE-2007-1748
BID: 23470
OSVDB: 34100

Background

The Windows DNS service runs an RPC management interface which listens on a dynamically assigned TCP port.

Problem

A buffer overflow vulnerability in the Windows DNS service allows remote attackers to execute arbitrary commands by sending a specially crafted RPC request to the management interface port.

Resolution

See Microsoft Security Advisory 935964 for information on available updates and workarounds.

References

<http://www.us-cert.gov/cas/techalerts/TA07-103A.html&gt;

Limitations

Exploit works on Windows 2000 SP0 to SP4 and Windows Server 2003 SP1 and SP2.

Platforms

Windows 2000
Windows Server 2003